Articles Posted in Cybersecurity

On December 19, 2013, Target issued a statement confirming a major security breach. According to the statement, approximately 40 million customers were at risk for identity theft because of the breach. Hackers had gained access to customer information, including their names, credit card numbers, debit card numbers, card expiration dates, and security codes. This incident brought light to the ongoing threat of identify theft for customers who use credit or debit cards to make purchases, either in stores or online. With this growing threat, consumers need to take care to protect themselves against potential attacks.

What Is the Extent of the Target Security Breach?

According to Target’s investigations, the hackers began accessing customer information from before Thanksgiving until mid-December. With the information they stole, which is stored on a card’s magnetic strip, the hackers could have made purchases all around the world. Indeed, hackers can also use this information to create new credit or debit cards. Although, there is no evidence the hackers also stole pin numbers, but if they had, they could have withdrawn money from customers’ bank accounts. The United States Secret Service is looking into this massive security breach. In the past, federal and state authorities have held companies liable, even issuing fines, if investigations reveal that a company did not take adequate steps to protect customer information. Analysts predict that here Target may have to spend over $100 million in legal costs to fix the security breach. Costs will increase even more if it’s forced to reimburse credit card companies for fraudulent purchases. However, in the meantime, Target’s first priority has been to act quickly to secure and protect customer information. Although, they have not reached any conclusions, initial investigations suggest the breach could have come entirely from outside hackers, or it could have been achieved with help from its employees. Either way, this level of a security breach suggests that it reached deep within the corporation.

Cyber criminals are very skilled in singling out vulnerable targets for online schemes. For instance, senior citizens are ideal candidates for cyber fraud or Internet fraud because they are more likely to have large amounts of money saved up, and they tend to have better credit, making schemes more profitable for criminals. If you are a senior citizen, or you know of an elder consumer who was a victim of Internet fraud, please contact us today to discuss available legal remedies and protections.

Why Are Senior Citizens Ideal Targets for Internet Fraud?

Older American citizens are often not familiar with the methods available to report fraud. Also, they are hesitant to report fraud because they are worried their relatives will decide they are no longer able to handle their own finances. Unfortunately, failure to report cyber crime immediately leads to a loss of evidence, and makes it very easy for cyber criminals to disappear without a trace. Furthermore, the more time that passes between the crime and prosecution, the more details and evidence are lost to memory. Cyber criminals depend on elder citizens’ weakened memory because the loss of evidence also prevents effective prosecution, and cyber criminals are able to walk away without punishment.

A business’s trade secrets are an essential component of its foundation, growth, and development. A trade secret is any sort of confidential and proprietary information that a company seeks to protect from unauthorized access.  For example, a trade secret, includes a formula, pattern, compilation, program, device, method, technique, or process (e.g., computer algorithm).  By definition, a trade secret is only valuable so long as it remains a secret.   In recent years, as businesses conduct more transactions over cyberspace, there is a higher probability of trade secret theft or loss. However, the constantly changing nature of cyberspace, and the anonymity users enjoy over the Internet, make protecting trade secrets a complex issue.

What is the Threat to Trade Secrets in Cyberspace?

Trade secrets in cyberspace, which involve software and digital information, can be misappropriated or wrongfully taken and used without detection.  It is also known as “cybertheft.”  For example, an online user has the capacity to view and distribute trade secrets without detection within minutes.   Online message boards allow users to post trade secrets over the web anonymously.  By concealing their identity, it is possible to steal a trade secret without detection.  Indeed, the courts continue to issue decisions that recognize individual privacy rights in digital trade secret misappropriation cases, preventing the trade secret owner from seeking legal remedies. Furthermore, in the past, trade secret theft was intended to secure an economic advantage between competing companies. However, recent cases, such as Ford Motor Co. v. Lane, illustrate that trade secrets are vulnerable to dissatisfied employees who distribute trade secrets only to harm an employer.  On a side note, hackers may even steal and distribute trade secrets simply to show off their technical skills.

In recent times, the threat of privacy invasions has spread far beyond domestic governmental agencies, but to also include foreign and international governments. Do you travel outside of the United States? Do you travel with electronic devices, such as a cellphone or laptop? Do these devices hold any sensitive information, such as passwords or confidential communications? If yes, then your electronic privacy may be compromised when you travel abroad.

What Is the Threat to Privacy Abroad?

The simple truth is that border patrol agents in countries around the world take data from cellphones, laptops, and other electronic devices as tourists cross their borders. This data can include, but is certainly not limited to, passwords, files, and emails. Although, this is a common practice around the world, most tourists have no idea that their personal information becomes increasingly more vulnerable to invasions of privacy when they leave the United States. Indeed, the threat extends to hotels that may extract information from electronic devices through their free wireless systems.

On August 14, 2013, the FBI confirmed its investigation regarding a sextortion case involving several women, including the recently-crowned Miss Teen USA, Cassidy Wolf. While the FBI did not release any information regarding the investigation or potential suspects, they did say the investigation has been going on for several months. Do you store personal information and photographs on your computer? Do you or your children use computers with webcam capabilities? If so, you might be at risk for cyber-stalking and sextortion. At the Law Offices of Salar Atrizadeh, an attorney with experience and knowledge in the most recent cyberspace law can help you learn how to protect yourself against cyber attacks such as these.

What Is the Extent of the Sextortion Threat In the Community?

Cassidy Wolf had said in an interview that she had received an email from an anonymous source who claimed to have nude pictures of her. The anonymous source then attempted to extort her, threatening to make the pictures public otherwise. Apparently, a hacker was able to break into Cassidy Wolf’s computer, turn on her webcam, and take pictures of her. For Miss Wolf, this controversy came after the hacker cyber-stalked her through her computer.

As cyberspace becomes a larger part of everyday life, the threat of cybercrimes becomes more prevalent. Consumers conduct all sorts of business over the Internet, which involves storing and transferring personal information on various online sites. Accordingly, the wealth of personal information available over the Internet has drawn in a new type of crime–phishing and spoofing. Cybercriminals disguise as other people, or legitimate business entities, and they entice consumers to give out personal information, such as bank account numbers. These tactics also help cybercriminals steal people’s identities.

What is the Difference Between Phishing and Spoofing?

Phishing is the practice of posing as a legitimate business entity to trick consumers into turning over personal information, such as passwords and bank account numbers. The cybercriminals then use this information to break into accounts and transfer money. They may also use this personal information to apply for credit cards, spend extravagant amounts of money, and ruin people’s credit. This is how cyber criminals perpetuate identify theft through phishing. With the right personal or financial information, cybercriminals disguise as other people, building up exorbitant debt against the victim.

Few crimes affect as broad a scope of people as identity theft. With social networks, credit cards, personal information, and contact information so interconnected, perpetrators can trespass into a person’s life by breaking past a single password-protected account. Accordingly, the Los Angeles County District Attorney’s Office has created a special division to aggressively prosecute this serious crime. Indeed, the District Attorney’s Office has indicated that it would pursue all cases of identity theft, regardless of how minor. This category of illegal activity includes everything from simply possessing information on another’s identity without their permission to using such information to obtain a credit card or make purchases.

In California, identity theft laws are especially strict because perpetrators can be convicted of felony identity theft regardless of whether the victim suffers financial harm as a result of the identity theft. In fact, signing someone else’s name on an official document may constitute identity theft, depending on the circumstances. Often, identity thieves work as members of larger organizations, which assemble and carry on large networks of identity theft. Someone may be accused of identity theft simply by association with members of such a network. Under California Penal Code § 530.5(a) to maintain a case of identity theft, the district attorney will need to show that a defendant intentionally obtained “personal identifying information” without the consent of the person, to use “for any unlawful purpose.” Defendants may be able to avoid prosecution for identity theft if they can present evidence to show that they obtained the identifying information with the person’s consent.

The most common identity theft cases include illegal credit cards, fake identification cards, stolen social security numbers, purchases with stolen credit cards, and skimming. Skimming involves installing a skimmer to illegal obtain identification and credit card information from card machines in retail stores and gas stations. Identity theft also involves cyber crimes such as phishing or spoofing.

After an investigation by U.S. Immigration Customs Enforcement’s Homeland Security Investigations unit, U.S. District Judge Arenda L. Wright found members of IMAGiNE Group guilty of criminal copyright infringement. The court found IMAGiNE Group, an Internet piracy circle, guilty of perpetuating an effort to release movies available only in movie theaters. A representative of the Motion Picture Association of America testified that IMAGiNE was responsible for the most expansive effort to release pirated films between September 2009 and September 2011.

Judge Wright sentenced Jeremiah B. Perkins, a leading member of IMAGiNE, to prison and ordered him to pay $15,000 in restitution damages. After prison, Perkins will also face three years of supervised release. Perkins was responsible for recording films in theaters and compiling data into complete movie files to share on the Internet. Perkins admitted to renting computers, registering domain names, and opening email and PayPal accounts to help run IMAGiNE’s operation.

The National Intellectual Property Rights Coordination Center (“IPR Center”) within the United States Department of Homeland Security has supported the underlying investigation in this case. This center is one of the federal government’s greatest weapons in the fight against counterfeiting and piracy. The IPR Center works closely with other agencies within the Department of Justice to facilitate information sharing in an effort to establish and enforce initiatives that deter intellectual property theft. This case was part of the IPR Center’s greater effort to hinder and stop the spread of intellectual property theft. Attorney General Eric Holder instigated these efforts in response to the increasing crimes against intellectual property. Additionally, in light of recent news concerning threats of international cyber attacks, these efforts also go a long way towards protecting American consumers, their health, and their safety. Preventing intellectually property theft also protects the American economy by prohibiting outside parties from profiting on American products and intellectual property. The IPR Center aims to increase intellectual property right protections by implementing stricter criminal and civil liability for property right infringements. Additionally, the IPR Center seeks to organize greater coordination among federal, state, and local law enforcement agencies. Finally, the task force aims to refocus efforts on international property right protections by establishing and strengthening relationships with foreign governments.

The news outlets have been reporting that the Chinese have allegedly been hacking into American infrastructures. Assuming this report is accurate, the United States is not equipped to handle the consequences of such an attack. These hackers would possess the power to disable the critical infrastructure in this country, eliminating electricity, gas, water, and all major transit systems. Indeed, earlier this year, both The New York Times and The Wall Street reported that hackers had infiltrated their systems and stolen confidential employee information. The New York Times has further reported that it has been experiencing constant attacks from the Chinese in an attempt to control information that pertains to China. The Ministry of National Defense in China denies any such cyberattack on The New York Times. In light of these recent developments, it has become increasingly important for individuals and businesses to take steps to ensure their cyber protection. By serving California and Washington D.C., the skilled attorneys at the Law Offices of Salar Atrizadeh successfully work on legal matters pertaining to cybersecurity and Internet law.

The former Secretary of Defense, Leon Panetta, has described the scene that will unfold after such an attack as a “cyber Pearl Harbor.” Indeed, these hackers could possess software with the capacity to destroy infrastructure hardware. Such an attack would spread chaos throughout the country for months while the government works to restore its vital systems. Pointing to the failed Cybersecurity Act of 2012, Panetta has called upon the private citizens and businesses to act to secure their cybersecurity. Hillary Clinton, former Secretary of State, confirmed that this was a crisis that required global attention.

These instances of “cyberterrorism” threaten to cause damage far beyond the destruction of 9/11. Mandiant, a cyber-security company based in the United States, traces these cyber-attacks to the People’s Liberation Army, the Chinese military. The efforts in America to make sense of these attacks have not led to any definitive answers. The dangers of cyber-attacks are apparent in the recent attack on Aramco, the Saudi Arabian oil company. The attack consisted of a virus, which destroyed 30,000 Aramco computers, and replaced essential files within the system with an image of an American flag burning. There was also a reported cyber-attack on Telvent (now known as Schneider Electric), an international corporation that provides companies with the network and connections to remotely control power grids, oil pipelines, and gas pipelines. It remains unclear whether the hacking efforts are meant to steal confidential information, or whether the hacking is part of a larger scheme to derail vital American infrastructures. Indeed, the threat may not be limited to the Chinese, but rather part of a greater effort to launch an attack against American cybersecurity. This certainly poses a threat not only for national security, but also for individual cyber-security involving consumers and businesses that compose and participate in the crucial business and technology infrastructures.

In light of recent news that America’s cyber-network is vulnerable to outside attack, President Obama signed an Executive Order to improve cyber-security for the nation’s “critical infrastructure.” According to the Order, “critical infrastructure” applies to the vital physical and virtual systems in the United States that are essential to the country’s economic security, public health, and safety. This definition is in line with the definition of “critical infrastructure” in the Cybersecurity Act of 2012, which the federal government failed to pass.

The Executive Order is meant to promote greater information sharing among members of the same network. This will ensure that all network providers are adequately aware of potential threats to the system in time to plan and implement an effective response. Accordingly, American companies now bear the responsibility of evaluating whether “critical infrastructure” applies to their operations. Alternatively, the Executive Order may also apply to companies that provide goods or services to other companies that the Executive Order implicates. In this case, the Executive Order would also apply to the companies that provide the goods or services. These companies would then bear the same responsibility to abide by the Executive Order and participate in the information-sharing network.

The Executive Order also requires various federal agencies to participate in this network. The Office of the Attorney General, the Department of Homeland Security, and the Office of National Intelligence, among others, are responsible for participating to create an information-sharing network. Such a network will make it easier to detect and ward off cyber-threats. Additionally, the information-sharing network will allow the participating agencies to quickly notify the President of any legislation that is necessary to further protect the nation’s cyber-network. Furthermore, a working and productive network will incentivize other agencies and companies to join the network. Increased participants will improve the breadth of the network, work to expand the reach of the network, and add to the information that is available within the network.